Auto Suggestions are available once you type at least 3 letters. Use up arrow (for mozilla firefox browser alt+up arrow) and down arrow (for mozilla firefox browser alt+down arrow) to review and enter to select.

Paperback

$20.74$26.95Save 23%Current price is $20.74, Original price is $26.95. You Save 23%.

purchase options

Marketplace
- from
$1.99

Overview

Do you need to keep up with the latest hacks, attacks, and exploits affecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.

The Seven Deadliest Attacks Series provides readers with an overview of the most destructive prevailing attacks. Get them all and don't be caught unprotected!

Product Details

About the Author

Rob Kraus (CISSP, C|EH, MCSE) is a Senior Security Consultant for Solutionary, Inc. Rob is responsible for organizing customer requirements, on-site project management and client support while ensuring quality and timeliness of Solutionary's products and services.

Rob was previously a Remote Security Services Supervisor with Digital Defense, Inc. He performed offensive-based security assessments consisting of penetration testing, vulnerability assessment, social engineering, wireless and VoIP penetration testing, web application penetration tests and vulnerability research. As a supervisor, Rob was also responsible for leading and managing a team of penetration testers who performed assessment services for Digital Defense's customers.

Rob's background also includes contracting as a security analyst for AT&T during the early stages of the AT&T U-verse service as well as provisioning, optimizing, and testing OC-192 fiber-optic networks while employed with Nortel Networks.

Rob also speaks at information security conferences and universities in an effort to keep the information security community informed of current security trends and attack methodologies.Brian Barber (Linux+, MCSE, MCSA, MCP+I, CNE, CNA-GW) works for the Canada Deposit Insurance Corporation (CDIC) as a project manager and architect for CDIC's IT service management program. He first started using Linux at home with Red Hat 5.1 and since then he has been a staunch advocate of open source software, belonging to the Ottawa Canada Linux User Group (OCLUG) since 2001 and the Ottawa Python Authors Group. His primary areas of interest are operating systems, infrastructure design, multiplatform integration, directory services, and enterprise messaging. In the past he has held the positions of Principal Consultant with Sierra Systems Group Inc., Senior Technical Coordinator at the LGS Group Inc. (now a part of IBM Global Services) and Senior Technical Analyst at MetLife Canada.Mike Borkin (MCSE, GSEC Gold) is an internationally recognized author and speaker in the area of IT security where he focuses mostly on data protection strategies, Microsoft security, and security architecture/engineering best practices. In addition to contributing articles related to security to magazines and speaking engagements for groups such as SANS and The Open Group in both the US and Europe, Mike is also the Co-Author of Vista Security for Dummies.Naomi Alpern currently works for Microsoft as a consultant specializing in unified communications. She holds many Microsoft certifications, including an MCSE and MCT, as well as additional industry certifications such as Citrix Certified Enterprise Administrator, Security+, Network+, and A+. Since the start of her technical career she has worked in many facets of the technology world, including IT administration, technical training, and most recently, full-time consulting.

Editorial Reviews

"Seven Deadliest Microsoft Attacks brings to light easily exploitable yet commonly overlooked vulnerabilities of Microsoft systems. The real-world examples used help reinforce the magnitude of these attacks, all while depicting the simplicity of the attack itself. The authors end on a good note with steps to avoid becoming a victim and insight on industry trends."--Aaron Beauregard, IT Systems and Security Manager, Mueller Services, Inc.

"The text is peppered with warnings, notes, recommendations and so-called 'Epic Fail' text boxes that illustrate some of the typical mistakes made when working with that particular software...The bok and the chapters are short, but long enough to give a good overview of today's most common attacks targeting some of the most popular Microsoft products."--Zeljka Zorz, Help Net Security

With over 15 years at the Microsoft Corporation, Stephen Stepto Toulouse has been witness to
some amazing and fun things. Enjoy a journey through the eyes of a geek working at one of the most important companies in the world ...

*Please note that a lot of things have changed since this book was published and
some of the information contained in this book might be outdated*This is a very thorough, no-nonsense guide, useful for both experts and newbies.This is a ...

Let your Microsoft browsers do what they should do.That Microsoft Edge and Internet Explorer are
free browsers which come with Microsoft Operating Systems does not mean that users should take it to be the end of the matter because for ...

Get connected without delay.Skype For Business connects you with your friends, family, coworkers and many
others cost effectively.The design of the program makes using mouse for it okay but it is better when combined with essential keyboard shortcuts.Skype users need ...

One of the most popular databases worldwide is the Microsoft’s SQL Server. The Microsoft Azure
Cloud is rapidly making T-SQL one of the standards of SQL among millions of companies. The Microsoft SQL Server 2012 T-SQL book is your key ...

The Surface Book i7 was announced in October 26 and will be released in November.
It has been upgraded with a more powerful battery and processor compared to its predecessor. It has been praised for being the ideal laptop with ...